Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
FORESEC Academy
Security Essentials (II) :
Defense In-Depth
in-Depth
Basic Security Policy
Access Control and Password
Management
Incident Handling Foundations
Information Warfare
Web Communications and Security
Defense in-Depth
We have covered: networking, IP, IP
behaviour, basic traffic analysis, routing,
host perimeter defense.
Now, we add security policy, password
strength and assessment, incident handling,
information warfare and web security.
Authentication
Based
on:
- Something you know
Password, PIN
- Something you have Photo ID
or Security Token
- Something you are Biometrics
Security Token
Combined
Biometric authentication
Iris
scanners
Retinal scanners
Hand geometry substantiaters
Finger scanners, and many others
as well . . . even facial scanners
Biometric authentication
Despite
Data Classification
We
Threats
Activity
Threats
You
Vulnerabilities
Weaknesses
happen
Must be coupled with a threat to have
an impact
Can be prevented (if you know about
them)
= Threat x Vulnerability